Static task
static1
Behavioral task
behavioral1
Sample
c8ac4b07a8fbdd1bfeb70726ff9d041fdc006dba514e97a3e00e3137f5e540fb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c8ac4b07a8fbdd1bfeb70726ff9d041fdc006dba514e97a3e00e3137f5e540fb.exe
Resource
win10v2004-20221111-en
General
-
Target
c8ac4b07a8fbdd1bfeb70726ff9d041fdc006dba514e97a3e00e3137f5e540fb
-
Size
381KB
-
MD5
8e7246df9b7e3ef5dbc1421734e4bec7
-
SHA1
5046686f2398274bfd66f113afe2ed7b3cd4d771
-
SHA256
c8ac4b07a8fbdd1bfeb70726ff9d041fdc006dba514e97a3e00e3137f5e540fb
-
SHA512
25b8a4bfe9f50c6a1a2834b48686c05d19c2fa3ad7431f5dbac68ce382feef661f243a5748c6ba0550d6a64973f955d1acadabd172be4daec7d43ed1df481e09
-
SSDEEP
6144:r1lvkcynRlmRGEl2Ss572TyFPurpoZi98chj+O9NFDYiSN4tYqUKVDcGAZURhq4l:plvkcZRGEItQTe89R+ESQYBKVlq4mO00
Malware Config
Signatures
Files
-
c8ac4b07a8fbdd1bfeb70726ff9d041fdc006dba514e97a3e00e3137f5e540fb.exe windows x86
9e38c7bedf9845ef75a4d21de95dede2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleFileNameA
CloseHandle
WriteFile
CreateFileA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
GetProcAddress
GetFileSize
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetShortPathNameA
GetModuleHandleA
Sleep
GetTickCount
GetCurrentDirectoryA
FreeLibrary
GetStartupInfoA
advapi32
GetUserNameA
shell32
ShellExecuteA
msvcrt
__getmainargs
??3@YAXPAX@Z
exit
atoi
??2@YAPAXI@Z
strtok
_except_handler3
strstr
_exit
_XcptFilter
_acmdln
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 800B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 373KB - Virtual size: 373KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ